HomeGroupsTalkZeitgeist
This site uses cookies to deliver our services, improve performance, for analytics, and (if not signed in) for advertising. By using LibraryThing you acknowledge that you have read and understand our Terms of Service and Privacy Policy. Your use of the site and services is subject to these policies and terms.
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Practical Cryptography by Niels Ferguson
Loading...

Practical Cryptography

by Niels Ferguson

MembersReviewsPopularityAverage ratingMentions
261169,446 (3.88)1
Security is the number one concern for businesses worldwide. Thegold standard for attaining security is cryptography because itprovides the most reliable tools for storing or transmittingdigital information. Written by Niels Ferguson, lead cryptographerfor Counterpane, Bruce Schneier's security company, and BruceSchneier himself, this is the much anticipated follow-up book toSchneier's seminal encyclopedic reference, Applied Cryptography,Second Edition (0-471-11709-9), which has sold more than 150,000copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineerand consultant at Counterpane Internet Security. He has extensiveexperience in the creation and design of security algorithms,protocols, and multinational security infrastructures. Previously,Ferguson was a cryptographer for DigiCash and CWI. At CWI hedeveloped the first generation of off-line payment protocols. Hehas published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief TechnicalOfficer at Counterpane Internet Security, a managed-securitymonitoring company. He is also the author of Secrets and Lies:Digital Security in a Networked World (0-471-25311-1).… (more)

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

» See also 1 mention

This book is an excellent introduction to the application of cryptography to information security, highlighting its proper role and usage as well as covering design notes for cryptographically secure systems. ( )
  kislam | Nov 28, 2009 |
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language
Canonical DDC/MDS

References to this work on external resources.

Wikipedia in English (3)

No library descriptions found.

Book description
Haiku summary

Quick Links

Popular covers

Rating

Average: (3.88)
0.5
1
1.5
2
2.5 1
3 9
3.5 1
4 10
4.5 1
5 7

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 142,309,225 books! | Top bar: Always visible